Date: Tue, 1 Apr 1997 11:24:19 -0700 (MST) From: Terry Lambert <terry@lambert.org> To: jdp@polstra.com (John Polstra) Cc: terry@lambert.org, current@freebsd.org Subject: Re: A new Kernel Module System Message-ID: <199704011824.LAA11700@phaeton.artisoft.com> In-Reply-To: <199704010328.TAA25551@austin.polstra.com> from "John Polstra" at Mar 31, 97 07:28:52 pm
next in thread | previous in thread | raw e-mail | index | archive | help
> > I've felt for a long time now that the intent of the memory hole > > at the start of the executable in the ELF SVR4 EABI was to allow > > the mapping of the ld.so into the process address space without > > there being code in crt0.o to actually do the work. > > That is exactly the case in SVR4. The kernel maps the combined libc+ld.so > into the hole before execution begins. I knew that. I'm a former USL employee who hacked on SVR4 kernel code for FS, VM, and process context sharing. It just may not have been the intent of the spec. writers, even though I think it was, since they carefully avoid saying anything about the hole in their rationale. Probably because they don't want to have people come back on them later when their "large enough" reserved area is no longer "large enough". 8-). Regards, Terry Lambert terry@lambert.org --- Any opinions in this posting are my own and not those of my present or previous employers.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199704011824.LAA11700>